Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Somasundaram, K.
- An Effective CBHDAP Protocol for Black Hole Attack Detection in Manet
Abstract Views :206 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering and IT, Aarupadai Veedu Institute of Technology, Paiyanoor, Chennai - 603104, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Karpagam University, Coimbatore - 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering and IT, Aarupadai Veedu Institute of Technology, Paiyanoor, Chennai - 603104, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 36 (2016), Pagination:Abstract
Objective: The various features of mobile adhoc networks (MANET’s) are open medium, dynamic topology and absence of centralized monitoring point which introduces various security challenges. One among the security attacks are defined as the black hole attack in this article. Methods: In this paper we introduce a protocol for detecting and avoiding the black hole attacks in MANET’s by an efficient Crypto-key based Black Hole Detection and Avoidance Protocol (CBHDAP). Findings: The suggested protocol generates a group key using Diffie-Hellman (DH) based key agreement black hole detection algorithm then the generated key is forwarded to the authenticated group members. The validation of the nodes in the route from the source to the destination is done before initiating the transmission. The black hole attacks are avoided during transmission by considering the parameters such as time taken for Route Reply (RREP), hop count, Packet Delivery Ratio (PDR) are used. To validate the performance of the proposed approach, it is compared with the existing protocols for the metrics such as detection probability, throughput, end-to-end delay, etc. Improvements: The validation results prove that the CBHDAP provides optimal results for all the metrics like detection probability, throughput, E2E delay etc when compared with the algorithms existed.Keywords
CBHDAP, Blackhole Attack, Diffie-Hellman Algorithm, MANET’s, Security Attacks.- Data Confidentiality and Privacy in Cloud Computing
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 CSE Department, MSRIT, Bangalore - 560054, Karnataka, IN
2 CSE Department, Vel Tech High Tech Dr. RR and Dr. SR Engineering College, Avadi, Chennai - 600052, Tamil Nadu, IN
1 CSE Department, MSRIT, Bangalore - 560054, Karnataka, IN
2 CSE Department, Vel Tech High Tech Dr. RR and Dr. SR Engineering College, Avadi, Chennai - 600052, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 4 (2016), Pagination:Abstract
Background/Objectives: We propose a cloud based computing architecture to preserve data and privacy of the user’s location information and the interests of different intruders on service user’s data. Methods/Statistical Analysis: Data confidentiality and trust is in spike when it comes to modern cloud computing as storage and means of communication. Social Networking, usage of Location based services; cloud services offered by CSPs have become part of one’s daily life with the advent of smart phones. Findings: Location information of the user can be obtained using GPS (Global Positioning System) or RFID (Radio Frequency Identification). Hacking which the access to the data of the user is obtained. This forms two limitations, 1. Works only in GPS enabled devices. 2. If mobile devices perform such heavy computations it leads to battery depletion problem. To overcome the second limitation Mobile Cloud Computing is used. Improvements/Applications: Mobile Cloud Computing offers great computing power and storage to the mobile devices. It also increases the affordability and reliability but it is still in its budding stages in providing trust guarantees to the user.Keywords
CSP (Cloud Service Provider), Data Confidentiality, Location Based Services, Location Privacy, Multi-Level Access Control, Mobile Cloud Computing- Energy Efficient in Virtual Infrastructure and Green Cloud Computing: A Review
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
1 Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background: Cloud computing has been widely used to refer different technologies, services and concepts. It is associated with virtualized infrastructure or hardware on-demand. There exist many challenges especially in energy management on datacenter. To analyze the energy consumptions in datacenter, monitor the types of services which are offered by cloud computing to users. Statistical analysis: The parameters are analyzed and calculate the power usages in the different states, like server level, cluster level in the datacenter and are recorded in real time. The results are obtained at different level and helps to optimize the servers in data center, the server level optimization, consolidation and load balancing between the servers are achieved which helps to consume less in power in the cloud. Findings: Based on the statistical analysis, the server consolidation and optimization are required in the cloud environment. This paper mainly focused on application virtualization and desktop virtualization in cloud environment. From the identified the gap between server consolidation and optimization, created an experimental setup and continuously monitor the CPU usage, memory usage, Disk and network usage parameters. The Power consumption was calculated based on the above mentioned parameters which help to reduce the energy consumption in data center. Applications/Improvements: The analysis parameters are experimented in the laboratory which are helped to consume less power and reduced the carbon emission in the data center. This helps to achieves green cloud environment in data center.Keywords
Green Cloud, Server consolidation, Virtualization, Virtual Desktop- Study on Reliable and Secure Routing Protocols on Manet
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science Engineering, Karpagam University, Coimbatore – 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech High Tech Dr. RR Dr. SR Engineering College, Chennai - 600062, Tamil Nadu, IN
1 Department of Computer Science Engineering, Karpagam University, Coimbatore – 641021, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech High Tech Dr. RR Dr. SR Engineering College, Chennai - 600062, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 14 (2016), Pagination:Abstract
Objectives: This survey article intent presents knowledge into the security execution issues related to steering in wireless networking like MANET’s (Mobile Ad hoc Networks). Findings: The mobile adhoc networks are exposed to attacks at all the layers especially at the network layer. This study specially provides a set of solutions for the issues of various attacks like attacks on modifications, impersonation attacks, fabrication and rushing attacks. A few methodologies are analysed for prevention, detection and reaction on various attacks by malicious nodes. The study of this article has examined the methodologies meant for fathoming the implementation issues like, changes in topology, vitality utilization of stations, delay, throughput, transmit time, packet transmission ratio, systems or nodes security and administration. Conclusion: This article presents a comparison table specifying that every protocol provides security only to a limited access. Thus, there is still a prerequisite of more secured belief that can deal with the diverse asking for necessities like reliable protocols for security issues of MANET.Keywords
Attacks, Detection, Malicious Nodes, Network Layer, Prevention, Protocols, Security, Throughput- Enhancement of Network Lifetime by Improving the Leach Protocol for Large Scale WSN
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of ECE, Nandha College of Technology, Erode - 638052, Tamil Nadu, IN
3 Department of IT, Nandha Engineering College, Erode - 638052, Tamil Nadu, IN
1 Department of CSE, Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamil Nadu, IN
2 Department of ECE, Nandha College of Technology, Erode - 638052, Tamil Nadu, IN
3 Department of IT, Nandha Engineering College, Erode - 638052, Tamil Nadu, IN